ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • A SECURITY MANAGER'€™S GUIDE TO VENDOR RISK MANAGEMENT

    Sponsored by: BitSight

    Vendor risk management (VRM) is a critical business practice. Within the pages of this guide, security professionals will learn about basic questions you need to ask all vendors and the impact of continuous risk monitoring software.

  • Utilize Central Recovery Manager to Enforce HPE 3PAR File Persona Data Protection

    Sponsored by: NTT ICT

    This white paper demonstrates application-managed data protection that speeds and simplifies protection on your 3PAR StoreServ array. Access now to create local and remote snapshots for quick data recovery, and learn to enable hypervisor owners to control backup from their native tools.

  • Former Healthcare CIO Talks Cybersecurity in Healthcare

    Sponsored by: Optum

    Gary Seay, former vice president and CIO of Community Health Systems, was one of the earliest victims of a healthcare data breach back in 2014. In this e-guide, Seay shares what he believes every healthcare organization should do to ward off cyberattacks and shares specific technologies involved in maintaining cybersecurity for healthcare.

  • Healthcare CIOs Address Cybersecurity Vulnerabilities

    Sponsored by: Optum

    As breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.

  • 451 Research: Vormetric Enters Encryption Gateway Fray with Latest Extension to Its Platform Strategy

    Sponsored by: Vormetric

    This 451 Research report offers a current analysis of Vormetric's recent product releases, including the solutions offering tokenization with dynamic data masking, Teradata support, and cloud encryption gateway. The report also offers analysis of the Vormetric Data Security Platform strategy.

  • Pushing the Start Button on Information Lifecycle Governance

    Sponsored by: IBM

    Strong information governance ensures that big data remains an advantage for your company. It is important to realize that information governance improvement has to come slowly, in steps instead of strides. Read on to gauge your company's information governance maturity and how to set realistic goals.

  • Securosis: Securing Hadoop: Security Recommendations for Hadoop Environments

    Sponsored by: Vormetric

    This research paper lays out a series of recommended security controls for Hadoop, along with the rationale for each. The analysis is based upon conversations with dozens of data scientists, developers, IT staff, project managers, and security folks from companies of all sizes; as well as decades of security experience the Securosis team brings.

  • Market Guide for Merchant and Acquirer Tokenization of Payment Card Data

    Sponsored by: Vormetric

    The tokenization of sensitive data is a key component in the ensuring of payment system security. Chief Information Security Officers at cardacceptors and payment processors should use this Market Guide to choose the most appropriate products for their tokenization projects.

  • Bloor: For the EU's New Data Protection Regulation, Encryption Should Be the Default

    Sponsored by: Vormetric

    This report by Bloor Research discusses the changes being made to the EU data protection landscape and suggests that encryption should be the default choice for protecting data. Discover how you can make it part of a comprehensive, consistent data security strategy.

  • Harness Content to Deliver a Superior Customer Experience

    Sponsored by: IBM

    While you may have all the content your employees need, it isn't always easy for them to find what they're looking for when they need it. Browse this resource center to learn how you can enable employees to get what they need in order to make the right decisions, work efficiently, and drive results.

  • Ponemon Institute Application Security Risk Management Study

    Sponsored by: IBM

    This report shows you the results of the recent Ponemon Institute study entitled "How to Make Application Security a Strategically Managed Discipline". Inside, you'll see why many organizations are falling short of adequate application security and learn how you might patch your own application security vulnerabilities.

  • Can We Say Next-Gen Yet? State of Endpoint Security - SANS Report

    Sponsored by: IBM

    Discover how to formulate your own new endpoint protection strategy based around these ever changing endpoint devices. See how other organization are protecting their evolving perimeter and learn statistics from the SANS 2016 Endpoint Security Survey that will help you create your long-term endpoint management strategy.

  • Information Lifecycle Governance Maturity Assessment

    Sponsored by: IBM

    Increasing storage and maintenance costs, duplication of resources, the lack of trusted content, and exposure to risks and litigation are problems plaguing many enterprises today. So why are companies holding on to every bit of data? Take this assessment to determine your level of information governance maturity and see how much more you can grow.

  • Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done

    Sponsored by: AlienVault

    Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.

  • Building Success: Strengthen your Data Discovery and Classification

    Sponsored by: IBM

    How can you strengthen your data foundation without compromising its integrity? This Forrester Research Report breaks down the struggle with data discovery and security. What are strong approaches to data classification that you can implement in your company moving forward? Read this report now and find out.

  • Cost of a Data Breach Calculator

    Sponsored by: IBM

    This short survey helps you identify your organization's risk profile, which includes your organization's risk of experiencing a data breach, the average cost per compromised record and the total cost of a data breach to your organization.

  • Insider Threats: How to Spot Trouble Quickly with AlienVault USM

    Sponsored by: AlienVault

    Join us for this technical demo showing how USM can help you detect malware infections on end-user machines, insiders misusing network resources, and users engaging in suspicious behaviors.

  • Mitigate Model Risk and Reduce Model-Related Costs

    Sponsored by: SAS

    By establishing risk mitigation and cost reduction strategies targeted at model implementation and operation, you can easily identify models that are vital for guiding the direction of your business. Discover an approach to model risk management that supports your internal decision-making processes.

  • The Anatomy of a Ransomware Attack

    Sponsored by: Exabeam

    Read this research report to understand the business models used by ransomware network operators and how you can detect and disrupt ransomware in your corporate environments.

  • How Industry Collaboration Mitigates Cybersecurity Risks

    Sponsored by: LogRhythm, Inc.

    Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.

  • 4 Steps to Effectively Managing Risk and Compliance for Financial Services

    Sponsored by: IBM

    Learn why convergence is key to maximizing governance efforts, and discover the 4 steps financial services organizations can take to mitigate compliance risks.

  • Seven Steps to Ease the Pain of Managing a SOC

    Sponsored by: Intel Security

    Discover seven steps that will help SOC managers improve their ability to spot and eradicate threats at several points in the IT ecosystem, from the data center to the endpoint, both onpremises and in the cloud. Learn new, real-world solutions that simplify management, improve detection, and increase the speed of mitigation.

  • If A Hacker Wants Your Data, Make Sure They Really Work For It

    Sponsored by: Carbon Black

    This e-guide teaches you how to implement layered security within the infrastructure you control. Discover how to put strict controls on highly sensitive data and less stringent controls on data that's not so important with network segmentation. You can't entirely eliminate the risk of a breach, but you can make it harder on the attackers.

  • Bolster Your Incident Response and Threat Detection Strategy

    Sponsored by: Carbon Black

    In these digital times, how can you mitigate modern attacks? Discover how to centralize all endpoint activity into a single console, easily accessible to you at any time. Streamline incident response to quickly mitigate current risks and avoid future ones.

  • Cb Defense

    Sponsored by: Carbon Black

    Discover how you can gain next-generation AV to stop more attacks, see more threats, and close more security gaps than ever before. Get unprecedented visibility and actionable intelligence while protecting servers, laptops, and desktops from advanced attackers.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.